Description
An issue was discovered in Ubuntu wpa_supplicant that resulted in loading of arbitrary shared objects, which allows a local unprivileged attacker to escalate privileges to the user that wpa_supplicant runs as (usually root).




Membership in the netdev group or access to the dbus interface of wpa_supplicant allow an unprivileged user to specify an arbitrary path to a module to be loaded by the wpa_supplicant process; other escalation paths might exist.
Published: 2024-08-07
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-5739-1 wpa security update
EUVD EUVD EUVD-2024-46526 An issue was discovered in Ubuntu wpa_supplicant that resulted in loading of arbitrary shared objects, which allows a local unprivileged attacker to escalate privileges to the user that wpa_supplicant runs as (usually root). Membership in the netdev group or access to the dbus interface of wpa_supplicant allow an unprivileged user to specify an arbitrary path to a module to be loaded by the wpa_supplicant process; other escalation paths might exist.
Ubuntu USN Ubuntu USN USN-6945-1 wpa_supplicant and hostapd vulnerability
History

Wed, 18 Sep 2024 16:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 17 Sep 2024 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Canonical
Canonical ubuntu Linux
CPEs cpe:2.3:a:w1.fi:wpa_supplicant:-:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:-:*:*:*:*:*:*:*
Vendors & Products Canonical
Canonical ubuntu Linux

Wed, 11 Sep 2024 16:00:00 +0000

Type Values Removed Values Added
References

Thu, 29 Aug 2024 19:00:00 +0000

Type Values Removed Values Added
Metrics threat_severity

Important

threat_severity

Moderate


Wed, 07 Aug 2024 17:15:00 +0000

Type Values Removed Values Added
Title wpa_supplicant: wpa_supplicant loading arbitrary shared objects allowing privilege escalation
References
Metrics threat_severity

None

threat_severity

Important


Wed, 07 Aug 2024 15:30:00 +0000

Type Values Removed Values Added
First Time appeared W1.fi
W1.fi wpa Supplicant
CPEs cpe:2.3:a:w1.fi:wpa_supplicant:*:*:*:*:*:*:*:*
Vendors & Products W1.fi
W1.fi wpa Supplicant
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 07 Aug 2024 08:30:00 +0000

Type Values Removed Values Added
Description An issue was discovered in Ubuntu wpa_supplicant that resulted in loading of arbitrary shared objects, which allows a local unprivileged attacker to escalate privileges to the user that wpa_supplicant runs as (usually root). Membership in the netdev group or access to the dbus interface of wpa_supplicant allow an unprivileged user to specify an arbitrary path to a module to be loaded by the wpa_supplicant process; other escalation paths might exist.
Weaknesses CWE-427
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}


Subscriptions

Canonical Ubuntu Linux
W1.fi Wpa Supplicant
cve-icon MITRE

Status: PUBLISHED

Assigner: canonical

Published:

Updated: 2024-09-18T15:39:53.818Z

Reserved: 2024-05-23T21:10:21.160Z

Link: CVE-2024-5290

cve-icon Vulnrichment

Updated: 2024-08-07T14:04:34.876Z

cve-icon NVD

Status : Analyzed

Published: 2024-08-07T09:16:05.553

Modified: 2024-09-17T13:09:13.683

Link: CVE-2024-5290

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-08-07T00:00:00Z

Links: CVE-2024-5290 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses